4 Configuration
DES-1210 Series Switch Web UI Reference Guide
Max Session (1 - 4):
Enter a value between
1
and 4 to set the number of users that may simultaneously
access the Switch. The default setting is
1
.
Connection Timeout (120 - 600):
Allows the user to set the connection timeout. The use may set a time
between
120
and
600
seconds. The default setting is
120
seconds.
Authfail Attempts (2 - 20):
Allows the Administrator to set the maximum number of attempts that a user
may try to log on to the SSH Server utilizing the SSH authentication. After the maximum number of attempts
has been exceeded, the Switch will be disconnected and the user must reconnect to the Switch to attempt
another login. The number of maximum attempts may be set between
2
and
20
. The default setting is
2
.
Rekey Timeout:
Using the pull-down menu uses this field to set the time period that the Switch will change
the security shell encryptions. The available options are
Never
,
10 min
,
30 min
, and
60 min.
The default
setting is
60 min.
Security > SSH > SSH Authmode and Algorithm Settings
The SSH Authentication and Algorithm Settings page allows user to configure the desired types of SSH
algorithms used for authentication encryption.
Figure 4.86 – Security > SSH > SSH Settings
SSH Authentication Mode Settings:
Password:
Allows user to use a locally configured password for authentication on the Switch.
Public Key:
This parameter may be enabled if the administrator wishes to use a public key configuration set
on a SSH server, for authentication on the Switch.
Host Based:
This parameter may be enabled if the administrator wishes to use a host computer for
authentication. This parameter is intended for Linux users requiring SSH authentication techniques and the
host computer is running the Linux operating system with a SSH program previously installed.
Encryption Algorithm:
3DES-CBC:
Use the check box to enable or disable the Triple Data Encryption Standard encryption
algorithm with Cipher Block Chaining. The default is enabled.
Data Integrity Algorithm:
HMAC-MD5:
Use the check box to enable the supports of hash for message Authentication Code (HMAC)
MD5 Message Digest (MD5) mechanism.
HMAC-SHA1:
Use the check box to enable the supports of hash for message Authentication Code (HMAC)
Secure Hash Algorithm (SHA) mechanism.
Public Key Algorithm:
HMAC-RSA:
Use the check box to enable the supports of Hash for Message Authentication Code (HMAC)
mechanism utilizing the RSA encryption algorithm.
Click
Apply
to implement changes made.
Security > SSH > SSH User Authentication Lists
The SSH User Authentication Lists page is used to configure parameters for users attempting to access the
Switch through SSH.
60